Ftsun® • Microsystems

Ftsun® • Microsystems

ftsun® • microsystems Using the Network: Beginner's Guide . ------------~------.----- Part Number: 800-1711-10 Revision A, of 9 May 1988 Sun Workstation® and Sun Microsystems® are registered trademarks of Sun Microsystems, Inc. SunView™, SunOS™, Sun386iTM, and the combination of Sun with a numeric suffix are trademarks of Sun Microsystems, Inc. UNIX is a registered trademark of AT & T Bell Laboratories. All other products or services mentioned in this document are identified by the trademarks or service marks of their respective companies or organizations. Copyright © 1987, 1988 by Sun Microsystems, Inc. This publication is protected by Federal Copyright Law, with all rights reserved. No part of this publication may be reproduced, stored in a retrieval system, translated, transcribed, or transmitted, in any form, or by any means manual, electric, electronic, electro-magnetic, mechanical, chemical, optical, or other­ wise, without prior explicit written permission from Sun Microsystems. Contents Chapter 1 Overview ................................................................................................................ 3 1.1. What Is a Network? ........................................................................................................ 3 NFS ......................................................................................................................................... 3 The Yellow Pages ......................................................................................................... 6 Chapter 2 Login Access to Other Machines ........................................................ 11 2.1. Trust Amongst Machines on a Network ............................................................. 11 jete/hosts .............................................................................................................. 11 jete/hosts .equiv .......................................................................................... 12 2.2. Remote Login Witll r login ................................................................................. 13 Logging In to Another Machine With rlogin ....................................... 13 rlogin to a Machine Where You Don't Have a,Home Directory ............................................................................................................................ 13 rlogin to a Machine As Someone Else ..................................................... 14 r login to a Non-Existent Machine .............................................................. 14 Aborting an r login Connection ..................................................................... 14 Suspending an r 1 og in Connection 15 Verifying Your Identity with who am i 16 2.3. Remote Login Witll telnet ........................................... ,.i' .. ,.. ;':ii.... ~.;.;:;:;:;.:;;:" •., .. :, .. :.~:~ •.• ; •••;:::::: .. Logging In to a Machine Running Another ~.fJ:......... " ...... ~ ..t., ... Witll tel ne t .............................................................. ~.~;., .. ;;;:;:,;:.~ .. ;:i~~;:;:;·;, •• m>;; ••••••• @:i,.• ;~;:i;;" •..;::,::::::;:: t e lnet to a Non-Existent Machine ................ ,:;:;:;;.;i ••.• ~:;:;:;:;:;:: ••••• ;:;;:;:•.• ;,,+;:., ..... ;;:;;;;; Aborting a telnet Connection ..................................... ,..... :,: ....• ;.,,:;:;:.... ;.;+:,; •••. .:.:.:.;". Suspending a telnet Connection ........................................;,.;;",:, .. ;..:,,,, ... ,.......... 18 - iii- Contents - Continued Chapter 3 Mounting Remote Filesystems .............................................................. 23 3.1. The mount Command ............................................................................................... 23 3.2. The / ete/ f stab File ............................................................................................. 24 The umoun t Command ......................................................................................... 25 3.3. Options to mount and umount ........................................................................ 26 3.4. The Automounter ............................................................................................................. 27 3.5. Who's Mounting This System? showmount ............................................ 29 Chapter 4 Issuing Commands to Remote Machines ...................................... 33 4.1. Status InfOImation: ping, rup, and perfmeter .............................. 33 Dead or Alive: ping ............................................................................................... 33 Remote Uptime: rup ............................................................................................... 34 Perfonnance Meter: perfmeter .................................................................... 34 Remote User Infonnation With rusers ........................... ;......................... 35 The finger Command ......................................................................................... 36 4.2. Remote File Copy With rep and ftp ........................................................... 36 Copying from Another Machine to Your Machine Using rep ....... 37 Copying from Your Machine to Another Machine Using rep ....... 37 Copying Directories With rep ........................................................................... 38 Copying from Another Machine to Your Machine Using ft p ....... 38 Copying from Your Machine to Another Machine Using ftp ....... 39 4.3. Remote Command Execution With rsh ...................................................... '" 40 4.4. Network Error Notifications ...................................................................................... 41 Chapter 5 Using Dialup Terminals ............................................................................. 45 5.1. Equipment ............................................................................................................................ 45 5.2. Considerations ................................................................................................................... 45 Phone Number ................................................................................................................ 46 Baud Rate ...........................................................,............................................................... 46 5.3. The Process ......................................................................................................................... 46 5.4. Remote Login With tip .......................................................................................... 46 Establishing a Connection With tip .............................................................. 47 Problems Establishing a Connection With tip ....................................... 47 -iv- Contents - Continued Appendix A Command Summary ................................................................................. 51 Appendix B Glossary .............................................................................................................. 57 Index ....................................................................................................................................................... 61 -v- Tables Table 4-1 Network Error Notifications: Problems and Solutions ....................... 42 -vii- Figures Figure 1-1 A Non-Network Environment ......................................................................... 4 Figure 1-2 A Typical Network Set-Up ............................................................................... 5 Figure 2-1 An jete/hosts File ..................................................................................... 12 Figure 2-2 /ete/hosts. equiv File ............................................................................ 12 Figure 2-3 rlogin: Logging In to Another Machine ............................................. 13 Figure 2-4 rlogin: Logging In to a Machine Without a Home Directory ...................................................................................................................... 13 Figure 2-5 rlogin: Logging In to Another Machine With a Different Usemame .................................................................................................................... 14 Figure 2-6 r login: Logging In to a Non-Existent Machine .............................. 14 Figure 2-7 r login: Aborting a Connection ................................................................. 15 Figure 2-8 Aborting to an Intermediate r login ...................................................... 15 Figure 2-9 rlogin: Suspending a Connection ........................................................... 15 Figure 2-10 Discovering Your True Identity.................................................................. 16 Figure 2-11 telnet: Logging In to a Machine Running Another Operating System ................................................................................................ 17 Figure 2-12 telnet: Logging In to a Non-Existent Machine 17 Figure 2-13 telnet: Aborting a Connection 18 Figure 2-14 t e lne t: Suspending a Connection ........... ,',.:;:;:" ..... ;:.,.:.:.: ...... ;.,', .... .:"';;, ...... ,..,;;.;; Figure 3-1 Mounting Remote Filesystems .............................. ,:,:,:ii.·; ...,.·;:;:;·;·.;,; .. , •••·.:,:.:iii ............. ,,..<::,,. Figure 3-2 Mounting to A Different Directory ................................ ,~ ... ,';.:"', .... :;... : ... ,............. ,<"., Figure 3-3 Mounting to a Nonexistent

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    83 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us